Enxhia Sala – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania
Edlira Martiri – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania
Keywords:
Theoretical frameworks;
Information security;
Privacy;
Mobile technology
Abstract: This paper provides a comprehensive exploration of theoretical frameworks essential for understanding smartphone users’ security behavior. It delves into the Decomposed Theory of Planned Behavior (DTPB), Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Human-Computer Interaction (HCI). Every framework provides distinct perspectives on the implementation, acceptance, and usage of security measures. Through the integration of these frameworks, researchers get an in-depth understanding of the elements that impact behavioral intentions and actions in the domain of smartphone security. The paper also highlights the evolution and expansion of these frameworks over time, emphasizing their relevance in contemporary research and practical applications. Moreover, it outlines prospective directions for research, such as examining the interaction between developing technology and perceptions of security, evaluating the impact of cultural factors on security practices, and assessing the efficacy of interventions.

Download file

LIMEN Conference
9th International Scientific-Business Conference – LIMEN 2023 – Leadership, Innovation, Management and Economics: Integrated Politics of Research – CONFERENCE PROCEEDINGS, Hybrid (Graz University of Technology, Graz, Austria), December 7, 2023
LIMEN Conference Proceedings published by the Association of Economists and Managers of the Balkans, Belgrade, Serbia
LIMEN Conference 2023 Conference Proceedings: ISBN 978-86-80194-78-3, ISSN 2683-6149, DOI: https://doi.org/10.31410/LIMEN.2023
Creative Commons Non Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission.
Suggested citation
Sala, E., & Martiri, E. (2023). Exploring Theoretical Frameworks for Analyzing the Security Behavior of Smartphone Users. In V. Bevanda (Ed.), International Scientific-Business Conference – LIMEN 2023: Vol 9. Conference Proceedings (pp. 311-321). Association of Economists and Managers of the Balkans. https://doi.org/10.31410/LIMEN.2023.311
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-T
Ajzen, I. (2011). The theory of planned behaviour: Reactions and reflections. Psychology & Health, 26(9), 1113-1127.
Al-Gahtani, S. S. (2016). Empirical investigation of e-learning acceptance and assimilation: A structural equation model. Applied Computing and Informatics, 12(1), 27-50.
Arkesteijn, K., & Oerlemans, L. (2005). The early adoption of green power by Dutch households. Energy Policy, 33(2), 183-196.
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.
Boer, R. (2005). Trends in continuum mechanics of porous media (Vol. 18). Springer Science & Business Media.
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864.
Carroll, J. M. (2014). Human Computer Interaction – brief intro. Interaction Design Foundation – IxDF.
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158. doi:10.2307/249749
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319.
Davis, F. D. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475-487.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 982-1003.
Demoulin, N. T., & Coussement, K. (2020). Acceptance of text-mining systems: The signaling role of information quality. Information & Management, 57(1), 103120.
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429. doi:10.1111/j.1559-1816.2000.tb02323.x
Franz, C. R., & Robey, D. (1986). Organisational context, user involvement, and the usefulness of information systems. Decision Sciences, 17(3), 329-356.
Gefen, Karahanna, & Straub. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly, 27(1), 51.
Ginzberg, M. J. (1981). Early Diagnosis of MIS Implementation Failure: Promising Results and Unanswered Questions. Management Science, 27(4), 459-478.
Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300-311.
Hsieh, J. J. P.-A., Rai, A., & Keil, M. (2008). Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvantaged. MIS Quarterly, 32(1), 97-126.
Lazarus, R., & Folkman, S. (1984). Stress, appraisal, and coping. New York: Springer Publishing Company, Inc.
Lwin, M., & Saw, S. (2007). Protecting children from myopia: A PMT perspective for improving health marketing communications. Journal of Health Communication, 12.
Monat, A., & Lazarus, R. (Eds.). (1991). Stress and coping: An anthology. New York: Columbia University Press.
Plotnikoff, R. C., & Trinh, L. (2010). Protection Motivation Theory. Exercise and Sport Sciences Reviews, 38(2), 91–98. doi:10.1097/JES.0b013e3181d49612. PMID: 20335741.
Prentice-Dunn, S., McMath, B., & Cramer, R. (2009). Protection motivation theory and stages of change in sun protective behavior. Journal of Health Psychology, 14.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93–114. doi:10.1080/00223980.1975.9915803. PMID: 28136248.
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book, 153-176.
Sharda, R., Barr, S. H., & McDonnell, J. C. (1988). Decision Support System Effectiveness: A Review and an Empirical Test. Management Science, 34(2), 139-159. https://doi.org/10.1287/mnsc.34.2.139
Singh, N., Sinha, N., & Liébana-Cabanillas, F. J. (2020). Determining factors in the adoption and recommendation of mobile wallet services in India: Analysis of the effect of innovativeness, stress to use and social influence. International Journal of Information Management, 50, 191-205. https://doi.org/10.1016/j.ijinfomgt.2019.05.022
Taylor, S., & Todd, P. (1995a). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137-155. doi:10.1016/0167-8116(94)00019-K
Taylor, S., & Todd, P. (1995b). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
Van der Velde, F. W., & Van der Plight, J. (1991). AIDS-related health behavior: Coping, protection, motivation, and previous behavior. Journal of Behavioral Medicine, 14(5), 429–451. doi:10.1007/bf00845103. PMID: 1744908.
Van Slyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16(3), 270–283.
Venkatesh, V., & Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences, 39(2), 273-315.